default search action
Weidong Zhong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Yuan Tian, Tanping Zhou, Xuan Zhou, Weidong Zhong, Xiaoyuan Yang:
Attribute-based linear homomorphic signature scheme based on key policy for mobile crowdsensing. J. King Saud Univ. Comput. Inf. Sci. 36(6): 102114 (2024) - [j6]Xuan Zhou, Yuan Tian, Weidong Zhong, Tanping Zhou, Xiaoyuan Yang:
A structure-preserving linearly homomorphic signature scheme with designated combiner. PeerJ Comput. Sci. 10: e1978 (2024) - [j5]Liangchao Zhu, Xuwei Wang, Weidong Zhong, Ming Li:
Learning microstructure-property mapping via label-free 3D convolutional neural network. Vis. Comput. 40(10): 7025-7044 (2024) - 2023
- [j4]Zichao Song, Tanping Zhou, Weidong Zhong, Dong Chen, Longfei Liu, Xiaoyuan Yang:
Fault-Tolerant Data Aggregation Scheme Supporting Fine-Grained Linear Operation in Smart Grid. IEEE Access 11: 68525-68537 (2023) - [c7]Jinghui Fang, Bo Zhang, Jian Feng, Guozhong Jin, Weidong Zhong:
Fault Classification and Diagnosis Method for Photovoltaic Power Connected to Distribution Network Equipment Based on arc Flashover Analysis. ICBASE 2023: 359-362 - [c6]Yiwei Zhao, Song Jiang, Weidong Zhong, Lizhong Wang, Xiao-Feng Li:
NEOP: A Framework for Distributed Mobile Apps on Heterogeneous Devices. ISADS 2023: 1-8 - 2022
- [c5]Jinghui Fang, Bo Zhang, Weidong Zhong, Jian Feng, Guozhong Jin, Xijun Gao, Ling Wei:
Setting Calculation Method and Protection Coordination for Relay Protection System in Consideration of Arc Flash. ICSAI 2022: 1-10
2010 – 2019
- 2019
- [j3]Shuaiwei Zhang, Xiaoyuan Yang, Lin Chen, Weidong Zhong:
A Highly Effective Data Preprocessing in Side-Channel Attack Using Empirical Mode Decomposition. Secur. Commun. Networks 2019: 6124165:1-6124165:10 (2019) - [c4]Peng Ma, Zeyu Wang, Weidong Zhong, Xu An Wang:
Preprocessing of Correlation Power Analysis Based on Improved Wavelet Packet. 3PGCIC 2019: 378-388 - [c3]Wenchao Liu, Feng Pan, Xu An Wang, Guangsheng Tu, Weidong Zhong:
Construction and Parallel Implementation of Homomorphic Arithmetic Unit Based on NuFHE. CISIS 2019: 660-668 - 2018
- [j2]Shuaiwei Zhang, Weidong Zhong:
A New Type of Countermeasure against DPA in Multi-Sbox of Block Cipher. Wirel. Commun. Mob. Comput. 2018: 5945312:1-5945312:11 (2018) - 2015
- [j1]Wei Zhang, Shuguang Liu, Weidong Zhong, Xiaoyuan Yang:
How to build a faster private information retrieval protocol? J. Ambient Intell. Humaniz. Comput. 6(5): 549-555 (2015) - 2011
- [c2]Weidong Zhong, Xu An Wang, Ziqing Wang, Yi Ding:
Proxy Re-encryption with Keyword Search from Anonymous Conditional Proxy Re-encryption. CIS 2011: 969-973 - 2010
- [c1]Jia Liu, Weidong Zhong, Min-Qing Zhang, Xiaoyuan Yang:
Recognizing human actions using bag-of-features and Intersection Kernel Support Vector Machines. NCM 2010: 290-293
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-14 23:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint